COMPUTER SOFTWARE
OPERATING SYSTEMS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
How does PKI work?
|
Server public key (Asymmetric key) sent to clientClient uses its private key to encrypt webpage key (asymmetric Key)Cipher text sent to serverServer decrypts with public key (symmetric). Server now has safe webpage.
|
|
Client and server agree on a key (Symmetric Key)Key sent so both have copyClient encrypts website with credentials and sends cipher to Server (symmetric key)Server now decrypts with given shared private key (symmetric)Server can encrypt anything with the same private (symmetric) key and send back to the client
|
|
Server public key (Asymmetric key) sent to clientClient uses the given key to encrypt session key (symmetric Key)Cipher text sent to serverServer decrypts with private key (asymmetric key). Both now have session key to communicate safely, and quickly.
|
|
None of the above
|
Explanation:
Detailed explanation-1: -Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. If the public key is used for encryption, then the related private key is used for decryption. If the private key is used for encryption, then the related public key is used for decryption.
Detailed explanation-2: -PKI uses both symmetric encryption and asymmetric encryption to encrypted data.
There is 1 question to complete.